{"id":8149,"date":"2017-02-01T01:03:33","date_gmt":"2017-02-01T00:03:33","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=8149"},"modified":"2019-03-11T14:52:08","modified_gmt":"2019-03-11T13:52:08","slug":"sap-security-may-not-be-niche-deadlines","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/en\/sap-security-may-not-be-niche-deadlines\/","title":{"rendered":"SAP security must not be a niche product"},"content":{"rendered":"<p>Most companies have a lot of catching up to do in this area.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-8153\" src=\"http:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/01\/KaiGrunwitz.jpg\" alt=\"KaiGrunwitz\" width=\"198\" height=\"327\" \/>Underestimating the security issue is no longer in keeping with the times. Only a fully integrated and comprehensive cyber defense strategy that spans the entire IT can reliably protect against current and future threats.<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-2565473812\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-735965791\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-962581147\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n<p>This means that excluding SAP from a holistic security concept in the company cannot be effective.<\/p>\n<p>Even a pure focus of security on infrastructure issues no longer does justice to the current threat situation.<\/p>\n<p>Just as no one would think of leaving the heart out of a comprehensive health check-up, it should also be clear that SAP applications cannot be left out of security strategies.<\/p>\n<p>After all, SAP applications are the \"heart\" of many companies, through which all central business processes are controlled.<\/p>\n<h3>More focus on SAP<\/h3>\n<p>After all, companies are increasingly recognizing the security problems in the SAP environment.<\/p>\n<p>One reason for this is that auditors are currently also increasingly targeting the SAP world and examining SAP applications in terms of security during audits.<\/p>\n<p>And cases in which SAP departments receive \"red flags\" here are by no means an exception anymore.<\/p>\n<p>For management, this results in the need to give greater weight to the issue of safety than has been the case in the past.<br \/>\nBut where do we need to start? First of all, there are the current organizational structures of companies.<\/p>\n<p>At SAP, one can still generally speak of a compartmentalized world. SAP departments are usually separated from the rest of the IT teams and function as independent, autonomous units that attach only a subordinate role - if any - to the issue of security.<\/p>\n<p>The SAP theme is clearly business-driven. When it comes to security, however, this organizational separation must be eliminated.<\/p>\n<h3>Old systems not enough<\/h3>\n<p>Conventional security concepts are no longer adequate. They are usually based exclusively on perimeter protection and reactive measures.<\/p>\n<p>What is needed, however, are end-to-end security solutions that also include active protection.<\/p>\n<p>The classic network protection wall is supplemented by proactive security mechanisms that extend to business-critical applications such as SAP software.<\/p>\n<p>This means that IT security today must be about much more than pure infrastructure and technology management. They are merely the basis.<\/p>\n<p>The first step in implementing new security and compliance strategies should be an inventory, a clear analysis and risk assessment that covers all of IT.<\/p>\n<p>Only in the further steps can a decision be made about the use of the right tools or services.<\/p>\n<h3>Many new possibilities<\/h3>\n<p>And here there are numerous new solutions especially for SAP applications, since SAP itself has been increasingly addressing the issue of security for some time and has been launching security products on the market.<\/p>\n<p>Examples include SAP Single Sign-on for secure access to SAP and non-SAP systems and SAP Identity Management for efficient user administration.<\/p>\n<p>However, the use of such SAP security tools is by no means enough. It would only lead to more isolated solutions being present in the company.<\/p>\n<p>Equally important is the consistent linking of the various solutions, for example in the area of user administration.<\/p>\n<p>It is obvious that only a company-wide implementation of authorization concepts makes sense. Setting up a parallel world of SAP and the rest of IT cannot be the last word in wisdom.<\/p>\n<h3>In other words:<\/h3>\n<p>Use of SAP tools yes, but also linkage with the solutions otherwise used in the company, i.e. implementation of a holistic approach with a move away from silo thinking with a patchwork of solutions.<\/p>\n<p>And one thing must not be forgotten in the whole \"security discussion\": In the past, security was purely an IT issue.<\/p>\n<p>Increasingly, however, a paradigm shift is emerging that is characterized by two aspects: on the one hand, security is increasingly business-driven, and on the other, security also drives business.<\/p>\n<p>This means that security is increasingly being classified as a mission-critical business process and is also being used as a competitive differentiator by marketing security as part of product, solution or service quality.<\/p>\n<p>Security is thus increasingly becoming a central business factor - both as an important component of the value chain and as a complementary business driver.<\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers make no distinction between general IT systems and SAP applications. Consequently, the issue of security must also be given greater consideration with regard to SAP software.<\/p>","protected":false},"author":100,"featured_media":4163,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[1858,10,7],"tags":[],"coauthors":[26015],"class_list":["post-8149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mag1702","category-das-aktuelle-stichwort","category-meinung"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",400,172,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-768x331.jpg",768,331,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-100x43.jpg",100,43,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-480x207.jpg",480,207,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-640x276.jpg",640,276,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-720x310.jpg",720,310,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",1000,431,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort.jpg",600,259,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/12\/Das-aktuelle-Stichwort-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Hacker machen keinen Unterschied zwischen allgemeinen IT-Systemen und SAP-Applikationen. Folglich muss auch hinsichtlich SAP-Software das Thema Sicherheit st\u00e4rker ber\u00fccksichtigt werden.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/mag1702\/\" rel=\"category tag\">MAG 17-02<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/the-current-keyword\/\" rel=\"category tag\">Das aktuelle Stichwort<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>","author_info_v2":{"name":"Kai Grunwitz, NTT Security","url":"https:\/\/e3magpmp.greatsolution.dev\/en\/author\/kai-grunwitz\/"},"comments_num_v2":"0 comments","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/8149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/comments?post=8149"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/8149\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media\/4163"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media?parent=8149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories?post=8149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/tags?post=8149"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/coauthors?post=8149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}